2020
DOI: 10.1007/978-3-030-65411-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Assembly or Optimized C for Lightweight Cryptography on RISC-V?

Abstract: A major challenge when applying cryptography on constrained environments is the trade-off between performance and security. In this work, we analyzed different strategies for the optimization of several candidates of NIST's lightweight cryptography standardization project on a RISC-V architecture. In particular, we studied the general impact of optimizing symmetric-key algorithms in assembly and in plain C. Furthermore, we present optimized implementations, achieving a speed-up of up to 81% over available impl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Campos et al [265] compared the effectiveness of various optimization methods on six of the second-round candidates when implemented on RISC-V platforms. The focus of this work was not to compare the performance between candidates, but, rather, to compare different implementation optimization strategies of a small number of candidates.…”
Section: Additional Resultsmentioning
confidence: 99%
“…Campos et al [265] compared the effectiveness of various optimization methods on six of the second-round candidates when implemented on RISC-V platforms. The focus of this work was not to compare the performance between candidates, but, rather, to compare different implementation optimization strategies of a small number of candidates.…”
Section: Additional Resultsmentioning
confidence: 99%
“…As a result of comparison with the implementation with Cortex-M4, RISC-V has about twice as general-purpose registers as Cortex-M4, but the efficiency of barrel-shifter is higher in terms of implementation speed for block cipher and hash function; therefore, It proved that RISC-V difficult to catch up Cortex-M4, using only 32RVI. In [34], an implementation study was conducted on the algorithm for LWC competition using RV32I. In their research, 32RVI and assembly characteristics were mainly used, not the algorithm itself.…”
Section: B Block Cipher On Risc-vmentioning
confidence: 99%
“…2.One area of the cryptography deals with the cryptanalysis of developed or improved ciphers. Differential [26] and Linear Cryptanalysis [27] has been the basic and first analysis of DES block cipher. [28][29][30][31][32][33] are the cryptanalysis frameworks and cryptanalysis work of well-known lightweight block ciphers.…”
Section: Related Studymentioning
confidence: 99%
“…Differential analysis is the cryptanalysis technique that studies the strength of cipher against differential attacks. Differential analysis is designed by Biham and Shamir [26]. It is used to trace the difference in outputs through non-linear parts of a block cipher.…”
Section: Differential Analysismentioning
confidence: 99%
See 1 more Smart Citation